JetStream Software Portal

How to Fix Password Expiration of IOF REST Credentials

This article applies to JSDR software version(s) 4.3.x onward running on vSphere 8.x or above.

Problem

When the IOF REST password is due to expire (or has expired), a warning message will be presented:

IOF REST warning.

The MSA uses the IOF REST user to communicate with hosts. The IOF REST user password is authenticated by vCenter SSO and expires according to the vCenter password expiration policy which is 90 days by default.

To review the current vCenter password policy details navigate to: Administration –> Single Sign On –> Configuration –> password policy –> edit

Solution

To reset IOF REST user authentication and stop the warning message from appearing, follow the steps below based on your operating environment:

For AVS:

  • Execute the following run-command from your Azure portal → AVS private cloud → Operations → Run commands → JSDR configuration (latest one): Enable-JetStreamRESTUser
    • Leave the username blank or use “jetstream
    • This run command will refresh the IOF REST user password and it will update the MSA with a new expiration date (per vCenter).
      • When the password expiration date approaches the warning message will be presented reminding you to execute the command to reset the password before it expires.

For On-prem:

  • Download the latest JSTools automation tool kit and deploy it.
  • SSH into the JSTools VM and navigate to the directory /opt/jetstream/jetdr/script/iofrestUser
  • Execute pwsh for PowerShell mode
  • Execute the script: ./manage_iofrest_user.ps1
    (enter the required details like vCenter FQDN/user_name/password, MSA IP/password, etc.)
    • The script will refresh the IOF REST user password and it will update the MSA with a new expiration date (per vCenter).
      • When the password expiration date approaches the warning message will be presented reminding you to execute the script to reset the password before it expires.

Note: The script can be uploaded to the MSA manually using WinSCP, and from there it can be executed (using the same operational steps described above).

Was this article helpful?

Related Articles

Can We Help You?

Can't find what you're looking for?
Contact JetStream